retweet icon bullhorn icon reply icon info icon flickr icon tumblr icon vimeo icon reddit icon podcast icon angle-down icon angle-left icon angle-right icon angle-up icon ban icon hamburger icon book icon bookmark icon bug icon caret-down icon caret-left icon caret-right icon caret-up icon chain icon check icon check-circle icon chevron-down icon chevron-left icon chevron-right icon chevron-up icon circle icon circle-o icon clone icon close icon download-cloud icon code icon download icon ellipsis icon envelope icon warning icon external-link icon eye icon eye-slash icon facebook icon github icon google-plus icon heart icon heart-o icon home icon info-circle icon instagram icon linkedin icon lock icon medium icon minus-circle icon send icon pause-circle icon play-circle icon plus-circle icon question-circle icon quote-left icon quote-right icon rss-square icon search icon share-alt icon slack icon snapchat icon ticket icon twitter icon wheelchair icon youtube icon Skip to main content
University of Texas at Austin - home
    Home
  • Home
  • Quick Links
    • Office of the CIO
    • University IT Policies
    • UT Austin Disaster Recovery Planning (UT Ready)
    • Acceptable Use Acknowledgement Form (for staff/faculty)
    • Security Exception Request
    • Stolen Equipment Report Form
    • Engagement Request Form
    • Anti-Virus Software
    • Vendor Product Security Assessment Request
    • Hall of Fame
    • Why You Should Work In Cybersecurity
  • Policies
    • Information Resources Use and Security Policy
    • Acceptable Use Policy for University Employees
    • Acceptable Use Policy for University Students
    • Digital Millennium Copyright Act
    • Policies, Standards, and Guidelines Continued
    • Minimum Security Standards
  • Support Topics
    • Security Awareness
    • Compromised Credentials
    • EDUCATION & OUTREACH
    • GETTING ANTI-VIRUS
    • ISORA
    • PROCEDURAL DOCUMENTATION
    • Stache Basics
    • VULNERABILITY MANAGEMENT PROGRAM
    • WAYS TO IMPROVE YOUR SECURITY POSTURE - IT SUPPORT COMMUNITY
  • Report Violation
  • Contact

ISO Research

ISO Research

Breadcrumb

  • Home
  • ISO Research

Research Blog

The ISO occasionally writes short articles on security topics such as security assessments, vulnerabilities, intrusion analysis, malware, and incident handling. The blog can be found here:

Research Blog

 

Research Papers

 

An Analysis of Gameover Zeus Network Traffic (January 2015)
 
Designing and Implementing a Honeypot for a SCADA Network (June 2014)
 
Flashback: Licensing Malware to Hinder Analysis and Functionality (April 2012)
 
An Algorithm for HTTP Bot Detection (December 2010)
 
SANS Institute Gold Paper: Analysis of a Simple HTTP Bot (December 2010)
 
SANS Institute Gold Paper: Get Out of Your Own Head: Mindful Listening for Project Managers (December 2010)
 
Obfuscation Used by an HTTP Bot (September 2010)
 
How To Create a Custom Live CD for Secure Remote Incident Handling in the Enterprise (June 2010)
 
SANS Technology Institute Leadership Laboratory: Applying the Pareto Principle to Information Security Management (March 2010)
 
SANS Institute Gold Paper: Remotely Accessing Sensitive Resources (February 2010
 
SANS Institute Gold Paper: Developing a Snort Dynamic Preprocessor (August 2008)
 
SANS Institute Gold Paper: Skype - A Practical Security Analysis (October 2008)
 
SANS Institute Gold Paper: Covering the Tracks on Mac OS X Leopard (June 2008)
 
SANS Institute Gold Paper: Auditing and Securing Multifunction Devices (January 2007)
 

ISO eye

Information Security Office

Copyright © 2006-2025, Information Security Office. All rights reserved.
Privacy Policy  |   Accessibility Policy
UT Austin logo